US9268929B2 - Dossier packaging - Google Patents
Dossier packaging Download PDFInfo
- Publication number
- US9268929B2 US9268929B2 US13/834,677 US201313834677A US9268929B2 US 9268929 B2 US9268929 B2 US 9268929B2 US 201313834677 A US201313834677 A US 201313834677A US 9268929 B2 US9268929 B2 US 9268929B2
- Authority
- US
- United States
- Prior art keywords
- user
- interest
- person
- dossier
- selected person
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Definitions
- the present disclosure generally relates to computer systems, and more particularly to the use of a computer system to obtain information regarding an individual.
- the subject technology provides computer-implemented method including: receiving a request from a user to log into a communications server in which the request includes user credentials; authenticating the user based on the included user credentials in the request; permitting the user to log into the communications server if the user is successfully authenticated; receiving a first input selecting a person of interest; retrieving information associated with the selected person of interest; generating a dossier of information including the retrieved information associated with the selected person of interest; and transmitting the generated dossier to the user or an indicated recipient.
- the subject technology further includes a system.
- the system includes a memory including instructions, and one or more processors configured to execute the instructions to: receive a request from a user to log into a communications server in which the request include user credentials; authenticate the user based on the included user credentials in the request; permit the user to log into the communications server if the user is successfully authenticated; receive a first input selecting a person of interest; receive a second input defining one or more filters for restricting information associated with the selected person of interest; determine a set of user restrictions associated with the user; retrieve information associated with the selected person of interest based on the defined one or more filters and the determined set of user restrictions; receive a third input selecting a download format for the retrieved information; generate a dossier of information including the retrieved information associated with the selected person of interest; and transmit the generated dossier to the user or an indicated recipient based on the selected download format.
- the subject technology further provides a machine-readable medium including instructions stored therein, which when executed by a machine, cause the machine to perform operations including: receiving a request from a user to log into a communications server in which the request include user credentials; authenticating the user based on the included user credentials in the request; permitting the user to log into the communications server if the user is successfully authenticated; receiving a first input selecting a person of interest; receiving a second input defining one or more filters for restricting information associated with the selected person of interest; determining a set of user restrictions associated with the user; retrieving information associated with the selected person of interest based on the defined one or more filters and the determined set of user restrictions; receiving a third input selecting a download format for the retrieved information; generating a dossier of information including the retrieved information associated with the selected person of interest; and transmitting the generated dossier to the user or an indicated recipient based on the selected download format.
- FIG. 1 illustrates an example architecture in which some configurations of the subject technology can be implemented.
- FIG. 2 is a block diagram illustrating an example communications terminal and communications server in the architecture of FIG. 1 according to certain aspects of the disclosure.
- FIG. 3 illustrates an example process for transmitting a dossier of information for a person of interest using the example communications server of FIG. 2 .
- FIG. 4 conceptually illustrates an example graphical user interface for setting user restrictions according to some configurations of the subject technology.
- FIG. 5 is a block diagram illustrating an example computer system with which the communications terminal and communications server of FIG. 2 can be implemented.
- the process for obtaining all deposit, phone call, visitation, and other communication information involving a single detainee may be difficult and frequently requires multiple searches across multiple systems. Obtaining this data in a format that is appropriate for offline review, such as for archiving or legal discovery, may be even more difficult.
- the process is further complicated with newer communications systems, such as video visitation, text and video exchange, self-edited profiles, and other digital communication.
- the subject technology allows investigators and other users to download a single file or organized collection of files allowing offline review of content (such as for an investigation), offline storage (such as on a CD, or flash drive for archiving), legal discovery (such as the sharing of files with attorneys), and for use as courtroom evidence.
- this package of offline data may be referred to as a “dossier.”
- FIG. 1 illustrates an example architecture 100 in which some configurations of the subject technology can be implemented.
- the architecture 100 illustrates a detention environment 102 that includes communications terminals 110 connected to a network 150 through a communications firewall 114 using a communications manager 112 .
- the architecture 100 further includes a communications server 130 as described herein connected to the network 150 through a communications server firewall 132 .
- the firewalls 114 and 132 can be software-based or hardware-based.
- Each of the communications terminals 110 is connected to a communications manager 112 .
- the communications terminals 110 can be connected to many communications managers.
- the communications terminals 110 can be audio communication terminals, video communication terminals, tactile communications terminals (e.g., for the visual and/or hearing impaired), or other terminals configured for communication between two individuals.
- the communication terminals can be mobile, such as mobile smartphones or mobile kiosks.
- the communications manager 112 to which the communications terminals 110 are connected can be, for example, a networking device such as a router, gateway, or switch.
- the communications manager 112 can be configured for various protocols of communication including, for example, Internet Protocol (IP), voice over IP (VoIP), audio and video Internet telephony network protocols, or telephone switching.
- IP Internet Protocol
- VoIP voice over IP
- audio and video Internet telephony network protocols or telephone switching.
- the communications manager 112 is connected to the network 150 , such as the Internet, a metropolitan area network (MAN), a wide area network (WAN), a broadband network (BBN), and the like.
- the network 150 can include, but is not limited to, any one or more of the following network topologies, including a bus network, a star network, a ring network, a mesh network, a star-bus network, tree or hierarchical network, and the like.
- the network 150 can include, for example, any one or more of a personal area network (PAN), a local area network (LAN), or a campus area network (CAN).
- PAN personal area network
- LAN local area network
- CAN campus area network
- the connection between the communications manager 112 and the network 150 can be protected using a communications firewall 114 , which can be particularly relevant to protecting the security of the detention environment 102 by limiting log ins to devices in the detention environment 102 to authorized individuals or processes.
- the communications server 130 is connected to the network 150 through the communications server firewall 132 .
- the communications server 130 is responsible for hosting resident location information provided by the communications terminals 110 for individuals in the detention environment 102 .
- the communications server 130 can be any device having an appropriate processor, memory, and communications capability for hosting the terminal-based resident location information.
- FIG. 2 is a block diagram 200 illustrating an example communications terminal 110 and communications server 130 in the architecture 100 of FIG. 1 according to certain aspects of the disclosure.
- the communications terminal 110 and communications server 130 are connected over the network 150 via respective communications modules 214 and 244 .
- the communications modules 214 and 244 are configured to interface with the network 150 to send and receive information, such as data, requests, responses, and commands to other devices on the network 150 .
- the communications modules 214 and 244 can be, for example, modems or Ethernet cards.
- the communications terminal 110 which can be a telephone, videophone, or camera, includes a processor 212 (or connected downstream to a processor, e.g., at communications server 130 ), the communications module 214 , and a memory 204 that includes an application 206 .
- the communications terminal 110 is illustrated as including the processor 212 for example only, it is understood that in certain aspects where, for example, the communications terminal 110 is a telephone, the processor 212 is not included in the communications terminal.
- the application is configured to control log ins to the communications terminal 110 .
- the communications terminal 110 also includes an input device 216 and an output device 214 , such as a display.
- the input device 216 can include, for example, a keyboard, a touchpad, a microphone, a camera, touchscreen, or mouse.
- the processor 212 of the communications terminal 110 is configured to execute instructions, such as instructions physically coded into the processor 212 , instructions received from software (e.g., application 206 ) in memory 240 , or a combination of both.
- the processor 212 of the communications terminal 110 is configured to execute instructions, such as instructions physically coded into the processor 212 , instructions received from software (e.g., application 206 ) in memory 240 , or a combination of both, to restrict logging in based on the location of the communications terminal 110 within a detention environment 102 .
- the processor 212 of the communications terminal 110 executes instructions from the application 206 to receive (e.g., by input device 216 ) a request from a user to log into the communications terminal 110 .
- a processor 242 of the communications server 130 is configured to execute instructions, such as instructions physically coded into the processor 242 , instructions received from software in memory 246 , or a combination of both.
- the communications server 130 may provide an interface, such as a web-based application, that allows users to set parameters, such as selecting a person of interest (e.g., a detainee of a jail or prison), and trigger a download of files or data associated with the selected person of interest stored in the detainee information 248 of the memory 246 . As illustrated in FIG.
- a client computing system 250 may be configured to send a request to the communications server 130 in order to log in the web-based application.
- the client computing system 250 may then provide inputs from the user to the communications server 130 for interacting with the web-based application.
- detainee information 248 can be stored in one or more other communications servers (e.g., a different communication server in a separate or same data center).
- the detainee information 248 can be provided by the communications server 130 to one or many communications servers, for example, as a form of data replication.
- FIG. 3 illustrates an example process 300 for transmitting a dossier of information for a person of interest using the example communications server 130 of FIG. 2 . While FIG. 3 is described with reference to FIG. 2 , it should be noted that the process steps of FIG. 3 may be performed by other systems or computing devices.
- the process 300 begins by proceeding from start step 305 when a request is received from a user (e.g., facility staff, investigator, or lawyer on the client computing system 250 ) to log into the communications server 130 .
- the user may utilize the client computing system 250 to send the request.
- the request includes user credentials (e.g., username, password, token, certificate, etc.).
- the process 300 authenticates the user based on the included user credentials in the request.
- step 315 a determination is made whether the user has been successfully authenticated. If the determination of step 315 indicates that the user has not been successfully authenticated, the process 300 ends. If the determination of step 303 indicates that the user has been successfully authentication, the process 300 permits the user to log into the communications server and the process 300 continues to step 320 .
- the process 300 receives a first input selecting a person of interest.
- the selected person of interest is a detainee of a jail or prison.
- the user may provide input (e.g., keyboard, mouse, touch, voice, etc.) in the interface of the web-based application provided by the communications server 130 .
- the process 300 receives a second input (e.g., keyboard, mouse, touch, voice, etc.) defining one or more filters (including one or more parameters) for restricting information associated with the selected person of interest.
- a second input e.g., keyboard, mouse, touch, voice, etc.
- the defined one or more filters may include at least one of a time period, type of data, a second person connected to the selected person of interest, or any person connected to the selected person of interest.
- the second person connected to the selected person of interest may be a friend of the selected person of interest or family member of the selected person of interest.
- the filters may be defined according to the following examples:
- the process 300 determines a set of user restrictions associated with the user.
- the set of user restrictions associated with the user include at least one of user privileges, access to data, or download permissions. More specifically, examples of allowed and/or disallowed user rights may include the following:
- the process 300 may, optionally, notify the user of any user restrictions determined in step 330 . For instance, a notification may be sent to the user to indicate certain types of files are not permitted for downloading based on the user restrictions.
- the process 300 retrieves information associated with the selected person of interest based on the defined one or more filters and the determined set of user restrictions.
- the retrieved information associated with the selected person of interest includes data pertaining to: an audio file, video file, attempted call, completed call, rejected call, voicemail, message left for customer service, call to customer service representative, call to automated customer service, exchanged text, exchanged photo, exchanged video, video visit scheduled, video visit completed, kiosk deposit, deposit by mail, deposit over the phone, grievance or inmate request attempted, grievance or inmate request submitted, do not contact block via customer service, do not contact block via web site, investigator note, customer service note, visited website, game played, contact searched, video station login, web login by a friend or family, inmate balance check, or inmate balance transfer.
- Other types of data may be included and still be within the scope of the subject technology.
- the following pieces of information are available from a downloaded dossier.
- any of the information below could be filtered out of a dossier, or selected for a dossier.
- the process 300 receives a third input selecting a download format for the retrieved information.
- the selected download format may be an e-mail including a link to the generated dossier, compressed file, Portable Document Format (PDF) file, MHTML file, or webarchive file.
- PDF Portable Document Format
- MHTML file MHTML file
- webarchive file a file that stores data
- the link to the generated dossier may expire after a predetermined period of time for security considerations. More specifically, the dossier may be:
- the process 300 generates a dossier of information including the retrieved information associated with the selected person of interest.
- the generated dossier includes one or more checksum values (e.g., hash) for verifying the retrieved information included in the generated dossier.
- the communications server 130 may store such checksum values in the memory 246 .
- an audio file or video file included in the dossier may be compressed to decrease download times.
- all recording files and data are compressed or merged into a single downloadable file. Examples of the single downloadable file may include, but are not limited to, TAR, RAR, SIT, GZIP and ZIP formats.
- step 355 the process 300 transmits the generated dossier to the user (e.g., the client computing system 250 ) or an indicated recipient (e.g., when the download format is an e-mail sent to one or more indicated recipients) based on the selected download format.
- the process 300 then ends.
- the dossier may be verified to ensure that the dossier has not been tampered.
- the file(s) included in the dossier may be compared with the checksum value(s), which may be a series of characters in an associated text file that act as a digital fingerprint.
- the checksum may be stored separately (e.g., on the communications server 130 , or in a file) for future verification of the data (e.g., files) included in the dossier.
- each downloaded dossier may include an accompanying text file containing a checksum (e.g., a hash or hashtag) for each recording contained in the dossier (e.g., zip or compressed file).
- a checksum e.g., a hash or hashtag
- Each checksum may be an MD5 hash of a specific digital file (e.g., audio or video recording, etc.) and may be understood as unique file “fingerprint.”
- the text above would be emailed or otherwise distributed separately from the digital recordings to prevent tampering of the digital recordings.
- Each digital fingerprint allows a user to verify that the file matches the original at any point in the future.
- a validation tool or application may be utilized to match each so-called “fingerprint” to each corresponding file.
- the validation tool may be included in a given operating system.
- the process 300 may be performed when a user (e.g., investigator or attorney) wishes to download a wide variety of data associated with a detainee for offline access (e.g., without Internet or network access).
- a user e.g., investigator or attorney
- download a wide variety of data associated with a detainee for offline access e.g., without Internet or network access.
- the following description describes example usage scenarios that might occur regarding a detainee that has been in custody for 12 weeks while waiting for a trial:
- FIG. 4 conceptually illustrates an example graphical user interface (GUI) 400 for setting user restrictions according to some configurations of the subject technology.
- GUI 400 may be provided by the communications server 130 in an interface of a web-based application (e.g., administrator console).
- a web-based application e.g., administrator console
- the GUI 400 includes one or more graphical elements.
- a graphical element can include, but is not limited to, a button, check box, radio button, slider, list box, drop-down list, menu, combo box, icon, text box, scroll bar, etc.
- a graphical display area 410 provides, in different graphical elements, information associated with an individual (e.g., investigator, etc.) such as a display name, login, password, next login option, group, domain, and organization.
- a user may interact with the graphical elements (e.g., text fields, drop-down menu, etc.) in the graphical display area 410 to modify the information associated with the individual.
- a graphical display area 420 provides, in different graphical elements, information corresponding to a set of privileges that define a set of user restrictions associated with the individual.
- a user may interact with the graphical elements (e.g., drop-down menu, etc.) in the graphical display area 420 to modify the set of privileges for different types of data that may be accessed by the individual (e.g., default, deny, read only, read/write).
- the subject technology provides granularity, on a per-user basis, in defining a set of user restrictions associated with an individual.
- FIG. 5 is a block diagram illustrating an example computer system 500 with which the communications terminal 110 and communications server 130 of FIG. 2 can be implemented.
- the computer system 500 may be implemented using hardware or a combination of software and hardware, either in a dedicated server, or integrated into another entity, or distributed across multiple entities.
- Computer system 500 (e.g., communications terminal 110 and communications server 130 ) includes a bus 508 or other communication mechanism for communicating information, and a processor 502 (e.g., processor 212 and 242 ) coupled with bus 508 for processing information.
- processor 502 e.g., processor 212 and 242
- the computer system 500 may be implemented with one or more processors 502 .
- Processor 502 may be a general-purpose microprocessor, a microcontroller, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), a Programmable Logic Device (PLD), a controller, a state machine, gated logic, discrete hardware components, or any other suitable entity that can perform calculations or other manipulations of information.
- DSP Digital Signal Processor
- ASIC Application Specific Integrated Circuit
- FPGA Field Programmable Gate Array
- PLD Programmable Logic Device
- Computer system 500 can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them stored in an included memory 504 (e.g., memory 204 and 246 ), such as a Random Access Memory (RAM), a flash memory, a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable PROM (EPROM), registers, a hard disk, a removable disk, a CD-ROM, a DVD, or any other suitable storage device, coupled to bus 508 for storing information and instructions to be executed by processor 502 .
- the processor 502 and the memory 504 can be supplemented by, or incorporated in, special purpose logic circuitry.
- the instructions may be stored in the memory 504 and implemented in one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, the computer system 500 , and according to any method well known to those of skill in the art, including, but not limited to, computer languages such as data-oriented languages (e.g., SQL, dBase), system languages (e.g., C, Objective-C, C++, Assembly), architectural languages (e.g., Java, .NET), and application languages (e.g., PHP, Ruby, Perl, Python).
- data-oriented languages e.g., SQL, dBase
- system languages e.g., C, Objective-C, C++, Assembly
- architectural languages e.g., Java, .NET
- application languages e.g., PHP, Ruby, Perl, Python.
- Instructions may also be implemented in computer languages such as array languages, aspect-oriented languages, assembly languages, authoring languages, command line interface languages, compiled languages, concurrent languages, curly-bracket languages, dataflow languages, data-structured languages, declarative languages, esoteric languages, extension languages, fourth-generation languages, functional languages, interactive mode languages, interpreted languages, iterative languages, list-based languages, little languages, logic-based languages, machine languages, macro languages, metaprogramming languages, multiparadigm languages, numerical analysis, non-English-based languages, object-oriented class-based languages, object-oriented prototype-based languages, off-side rule languages, procedural languages, reflective languages, rule-based languages, scripting languages, stack-based languages, synchronous languages, syntax handling languages, visual languages, wirth languages, embeddable languages, and xml-based languages.
- Memory 504 may also be used for storing temporary variable or other intermediate information during execution of instructions to be executed by processor 502 .
- a computer program as discussed herein does not necessarily correspond to a file in a file system.
- a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, subprograms, or portions of code).
- a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
- the processes and logic flows described in this specification can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output.
- Computer system 500 further includes a data storage device 506 such as a magnetic disk or optical disk, coupled to bus 508 for storing information and instructions.
- Computer system 500 may be coupled via input/output module 510 to various devices.
- the input/output module 510 can be any input/output module.
- Example input/output modules 510 include data ports such as USB ports.
- the input/output module 510 is configured to connect to a communications module 512 .
- Example communications modules 512 e.g., communications module 214 and 244
- networking interface cards such as Ethernet cards and modems.
- the input/output module 510 is configured to connect to a plurality of devices, such as an input device (e.g., input device 216 ) and/or an output device 516 (e.g., display device 218 ).
- Example input devices 514 include a keyboard and a pointing device, e.g., a mouse or a trackball, by which a user can provide input to the computer system 500 .
- Other kinds of input devices 514 can be used to provide for interaction with a user as well, such as a tactile input device, visual input device, audio input device, or brain-computer interface device.
- feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, tactile, or brain wave input.
- Example output devices include display devices, such as a LED (light emitting diode), CRT (cathode ray tube), or LCD (liquid crystal display) screen, for displaying information to the user.
- the communications terminal 110 and communications server 130 can be implemented using a computer system 500 in response to processor 502 executing one or more sequences of one or more instructions contained in memory 504 .
- Such instructions may be read into memory 504 from another machine-readable medium, such as data storage device 506 .
- Execution of the sequences of instructions contained in main memory 504 causes processor 502 to perform the process steps described herein.
- processors in a multi-processing arrangement may also be employed to execute the sequences of instructions contained in memory 504 .
- hard-wired circuitry may be used in place of or in combination with software instructions to implement various aspects of the present disclosure.
- aspects of the present disclosure are not limited to any specific combination of hardware circuitry and software.
- a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back end, middleware, or front end components.
- the components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network.
- the communication network can include, for example, any one or more of a PAN, LAN, CAN, MAN, WAN, BBN, the Internet, and the like. Further, the communication network can include, but is not limited to, for example, any one or more of the following network topologies, including a bus network, a star network, a ring network, a mesh network, a star-bus network, tree or hierarchical network, or the like.
- the communications modules can be, for example, modems or Ethernet cards.
- Computer system 500 can include clients and servers.
- a client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
- Computer system 500 can be, for example, and without limitation, a desktop computer, laptop computer, or tablet computer.
- Computer system 500 can also be embedded in another device, for example, and without limitation, a mobile telephone, a personal digital assistant (PDA), a mobile audio player, a Global Positioning System (GPS) receiver, a video game console, and/or a television set top box.
- PDA personal digital assistant
- GPS Global Positioning System
- machine-readable storage medium or “computer readable medium” as used herein refers to any medium or media that participates in providing instructions or data to processor 502 for execution. Such a medium may take many forms, including, but not limited to, non-volatile media, volatile media, and transmission media.
- Non-volatile media include, for example, optical disks, magnetic disks, or flash memory, such as data storage device 506 .
- Volatile media include dynamic memory, such as memory 504 .
- Transmission media include coaxial cables, copper wire, and fiber optics, including the wires that comprise bus 508 .
- machine-readable media include, for example, floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM, a FLASH EPROM, any other memory chip or cartridge, or any other medium from which a computer can read.
- the machine-readable storage medium can be a machine-readable storage device, a machine-readable storage substrate, a memory device, a composition of matter effecting a machine-readable propagated signal, or a combination of one or more of them.
- the phrase “at least one of” preceding a series of items, with the terms “and” or “or” to separate any of the items, modifies the list as a whole, rather than each member of the list (i.e., each item).
- the phrase “at least one of” does not require selection of at least one item; rather, the phrase allows a meaning that includes at least one of any one of the items, and/or at least one of any combination of the items, and/or at least one of each of the items.
- phrases “at least one of A, B, and C” or “at least one of A, B, or C” each refer to only A, only B, or only C; any combination of A, B, and C; and/or at least one of each of A, B, and C.
Abstract
Description
-
- Existing systems may require multiple searches across multiple systems, sometimes requiring multiple logins
- Frequently, acquiring call data information may require running one or more reports
- Downloaded files are not organized in a way that allows the simple sorting of information into a timeline of activity, or the filtering of information to show or hide specific types of information
- Many types of data may not accessible to facility staff (such as call center recordings)
- Once downloaded, there may be no mechanism to verify that the files have not been altered or comprised
-
- a. Who is the Person of Interest: Who does the dossier focus on?
- b. What Time Period: What time range is desired? Is it all time, or a specific time range?
- c. Who Else: Does the dossier cover everyone who interacted with the person of interest, or is it just limited to one or a few others?
- d. What Information: The dossier can include all known information, or it may be limited to specific types of information, such as just include financial transactions. Examples of different types of data listed after these steps.
-
- a. User privileges: the logged in user's system permissions to access phone recordings, or deposit information, etc.
- b. Access to data: facilities that the user is not attached to (e.g., a facility in a neighboring county where the person of interest may have been incarcerated in the past) may restrict access to data to the user
- c. Download permissions: some user settings prevent users from downloading audio and video files and these permission settings apply to this invention. Changing a user's rights to allow the downloading of recordings would allow downloads to take place.
-
- Attempted Calls
- Completed Calls
- Rejected Calls
- Voicemails
- Messages left for customer service
- Calls to customer service representative
- Calls to automated customer service
- Exchanged text, photos and video
- Video visits scheduled
- Video visits completed
- Kiosk deposits
- Deposits by mail
- Deposits over the phone
- Grievances/inmate requests attempted
- Grievances/inmate requests submitted
- Do not Contact blocks via customer service
- Do not Contact blocks via Web site
- Investigator notes
- Customer service notes
- Visited Websites (by inmate)
- Games played (by inmate)
- Contacts searched (by inmate)
- Video station logins by inmate
- Web logins by friends & family
- Inmate balance checks
- Inmate balance transfers
-
- a. Downloaded: downloaded as a compressed file (e.g., zip file) containing both data and recording files, as a single PDF, or as offline web content such as a zipped collection of web files, MHTML file or webarchive format.
- b. Emailed: a dossier may be emailed to a third party (e.g., defense attorney) by entering that person's email address. The dossier may be attached as a zip file, or sent as a one-time download link, which can be made more secure for opting for a limited window of availability for the download link.
2316183ce2cb10de32a0873cccaca178 | 01_O_Neil_415-412-9861_07-27-11_1215.wav |
e8c6f6c54423185044c82cfd947be9ea | 02_O_Neil_210-663-0540_07-27-11_1100.wav |
-
- 1. First, an investigator downloads a dossier of all financial, communications and commissary related records related to the detainee to assist in the search for cohorts in the crime that the detainee is accused of committing.
- 2. The investigator prints a document from the dossier that lists all of the events known to the communications system, which includes calls, deposits, Internet browsing history, games, photos exchanged, grievances filed, and video visits.
- 3. While the records show hundreds of completed calls to a variety of destinations, the investigator notices a number of attempted calls to a single number that were never accepted. The phone number is associated with a person who has previously deposited funds via smartphone to another inmate at another facility that uses Telmate (as its inmate communications provider). Because of this past activity, the dossier download from Telmate includes several clustered geolocation coordinates on a map that are related to previous activity.
- 4. The investigator checks out the geographic coordinates and sees that they cluster around an abandoned building. The abandoned building leads to the arrest of another suspect and the discovery of a methamphetamine lab.
Attorney - 1. The prosecuting attorney requests a download of all data associated with the original arrested detainee and a second download of all records associated with the newly arrested suspect.
- 2. The records are shared, through the legal discovery process, with the defense attorneys representing the suspects. Because the records can be downloaded as a single record, or organized batch of records, sharing this information with other attorneys involves just a few clicks.
- 3. The documents are discussed between the attorneys and the large amount of evidence that the two suspects are connected (through the records in the downloaded dossier), perhaps combined with other evidence gathered outside this invention, leads the suspects to plead guilty.
Archiving - 1. The downloaded dossier file or files are archived in a manner that matches the County and State's required archiving process ensuring that documents are available five or ten years later when the two detainees are up for parole.
Claims (23)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/834,677 US9268929B2 (en) | 2013-03-15 | 2013-03-15 | Dossier packaging |
CA2845757A CA2845757A1 (en) | 2013-03-15 | 2014-03-11 | Dossier packaging |
US15/013,744 US9529988B2 (en) | 2013-03-15 | 2016-02-02 | Dossier packaging |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/834,677 US9268929B2 (en) | 2013-03-15 | 2013-03-15 | Dossier packaging |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/013,744 Continuation US9529988B2 (en) | 2013-03-15 | 2016-02-02 | Dossier packaging |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140282926A1 US20140282926A1 (en) | 2014-09-18 |
US9268929B2 true US9268929B2 (en) | 2016-02-23 |
Family
ID=51535016
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/834,677 Active 2033-06-28 US9268929B2 (en) | 2013-03-15 | 2013-03-15 | Dossier packaging |
US15/013,744 Active US9529988B2 (en) | 2013-03-15 | 2016-02-02 | Dossier packaging |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/013,744 Active US9529988B2 (en) | 2013-03-15 | 2016-02-02 | Dossier packaging |
Country Status (2)
Country | Link |
---|---|
US (2) | US9268929B2 (en) |
CA (1) | CA2845757A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9529988B2 (en) | 2013-03-15 | 2016-12-27 | Intelmate Llc | Dossier packaging |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9778817B2 (en) | 2013-12-31 | 2017-10-03 | Findo, Inc. | Tagging of images based on social network tags or comments |
Citations (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020194470A1 (en) * | 2001-06-13 | 2002-12-19 | Robert Grupe | Encrypted data file transmission |
US20030101346A1 (en) * | 2000-02-29 | 2003-05-29 | Barron Austin Kesler | Method for notarizing receipt of electronic communications and enabling electronic registered mail; method for verifying identity of account party |
US20040019648A1 (en) * | 2002-07-01 | 2004-01-29 | Hemingway Huynh | Adaptive media messaging, such as for rich media messages incorporating digital content |
US20040199760A1 (en) * | 2003-04-01 | 2004-10-07 | Mazza Bruce P. | Ironclad notification of license errors |
US20050154685A1 (en) * | 2004-01-08 | 2005-07-14 | United Parcel Service Of America, Inc. | Methods and systems providing the capability to track intra-organizational packages |
US20050160371A1 (en) * | 1999-08-23 | 2005-07-21 | Sentillion, Inc. | Application launchpad |
US20050192813A1 (en) * | 2002-08-29 | 2005-09-01 | Hewlett-Packard Development Company, L.P. | Process for data distribution through a network |
US20050198165A1 (en) * | 2003-11-06 | 2005-09-08 | Reddel Frederick A.V | Systems and methods for electronic information distribution |
US20060053078A1 (en) * | 2002-10-18 | 2006-03-09 | Junichi Yamamoto | Content price control system, method and recording medium |
US20060161457A1 (en) * | 2002-01-25 | 2006-07-20 | Rapaport Jeffrey A | Adaptive communication methods and systems for facilitating the gathering, distribution and delivery of information related to medical care |
US20070033400A1 (en) * | 2005-08-08 | 2007-02-08 | Senez Raymond C Jr | System and method for secure electronic data delivery |
US20070250920A1 (en) * | 2006-04-24 | 2007-10-25 | Jeffrey Dean Lindsay | Security Systems for Protecting an Asset |
US20070298813A1 (en) * | 2006-06-21 | 2007-12-27 | Singh Munindar P | System and method for providing a descriptor for a location to a recipient |
US20080086646A1 (en) * | 2006-10-05 | 2008-04-10 | Ceelox, Inc. | System and method of secure encryption for electronic data transfer |
US20080147556A1 (en) * | 2006-12-15 | 2008-06-19 | Nbc Universal, Inc. | Digital rights management flexible continued usage system and method |
US20080162527A1 (en) * | 2006-12-29 | 2008-07-03 | Ceelox Inc. | System and method for secure and/or interactive dissemination of information |
US20080162646A1 (en) * | 2006-12-29 | 2008-07-03 | Ceelox Inc. | System and method for secure and/or interactive dissemination of information |
US20080184033A1 (en) * | 2006-11-02 | 2008-07-31 | Recombo, Inc. | System and method for generating agreements |
US20080235587A1 (en) * | 2007-03-23 | 2008-09-25 | Nextwave Broadband Inc. | System and method for content distribution |
US20080235733A1 (en) * | 2007-03-23 | 2008-09-25 | Nextwave Broadband Inc. | System and method for personal content access |
US20080294726A1 (en) * | 2004-04-22 | 2008-11-27 | Sidman George C | Private electronic information exchange |
US20090013359A1 (en) * | 2007-07-05 | 2009-01-08 | Jon Butler | Individualized digital media delivery systems |
US20090070744A1 (en) * | 2007-08-28 | 2009-03-12 | Sugarcrm Inc. | CRM SYSTEM AND METHOD HAVING DRILLDOWNS, ACLs, SHARED FOLDERS, A TRACKER AND A MODULE BUILDER |
US20090228822A1 (en) * | 2008-03-10 | 2009-09-10 | Brother Kogyo Kabushiki Kaisha | Display Control Apparatus and Display Control Program |
US20090271787A1 (en) * | 2008-04-25 | 2009-10-29 | Vmware, Inc. | Linking virtualized application namespaces at runtime |
US20090282451A1 (en) * | 2008-05-08 | 2009-11-12 | Soren Borup Jensen | Method and means for a multilayer access control |
US20100037324A1 (en) * | 2008-08-07 | 2010-02-11 | Grant Calum Anders Mckay | Computer file control through file tagging |
US20100197351A1 (en) * | 2005-05-10 | 2010-08-05 | Mobile Communication Technologies, Llc | Apparatus for and system for enabling a mobile communicator |
US20100251173A1 (en) * | 2009-03-26 | 2010-09-30 | Sony Corporation | Information processing device, contents processing method and program |
US20100259473A1 (en) * | 2008-09-29 | 2010-10-14 | Kotaro Sakata | User interface device, user interface method, and recording medium |
US20110055677A1 (en) * | 2009-08-25 | 2011-03-03 | Thomas Lima | Systems and methods for associating and organizing digital files |
US20110099621A1 (en) * | 2002-04-22 | 2011-04-28 | Nicholas Lizarraga | Process for monitoring, filtering and caching internet connections |
US20110276493A1 (en) * | 2010-04-30 | 2011-11-10 | Tobsc Inc. | Methods and apparatus for a financial document clearinghouse and secure delivery network |
US20110282944A1 (en) * | 2010-05-13 | 2011-11-17 | Broadvision | Systems and methods for content sharing across enterprise social networks |
US20120157040A1 (en) * | 2010-12-21 | 2012-06-21 | Sony Corporation | Information processing device, communication system, and billing method for wireless terminal device |
US20120222132A1 (en) * | 2011-02-25 | 2012-08-30 | Microsoft Corporation | Permissions Based on Behavioral Patterns |
US20130007129A1 (en) * | 2011-07-01 | 2013-01-03 | Stoneware, Inc. | Method and apparatus for application costing based on client hardware |
US20130019002A1 (en) * | 2009-11-17 | 2013-01-17 | Stc Unm | System and methods of resource usage using an interoperable management framework |
US20130055411A1 (en) * | 2011-08-24 | 2013-02-28 | Pantech Co., Ltd. | Apparatus and method for controlling permissions in mobile terminal |
US20130097562A1 (en) * | 2011-10-17 | 2013-04-18 | Research In Motion Corporation | System and method for navigating between user interface elements |
US20130318589A1 (en) * | 2012-04-27 | 2013-11-28 | Intralinks, Inc. | Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment |
US20140041052A1 (en) * | 2012-04-13 | 2014-02-06 | Adobe Systems Incorporated | Methods and systems for establishing and enforcing document visibitily rights with an electronic signature service |
US20140040761A1 (en) * | 2012-08-03 | 2014-02-06 | Google Inc. | Providing an update associated with a user-created point of interest |
US20140058873A1 (en) * | 2012-08-22 | 2014-02-27 | Scanavo North America Ltd. | Virtual packaging and electronic gifting system and methodology |
US20140123228A1 (en) * | 2012-10-25 | 2014-05-01 | Jacob Andrew Brill | Event Reporting and Handling |
US20140223099A1 (en) * | 2013-02-06 | 2014-08-07 | Adam Kidron | Content management platform apparatus, methods, and systems |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080028446A1 (en) * | 2006-07-25 | 2008-01-31 | Mypoints.Com Inc. | System and method of efficient e-mail link expiration |
WO2012050927A2 (en) * | 2010-09-28 | 2012-04-19 | Beyond Oblivion Inc. | Content discovery and delivery platform apparatuses, methods and systems |
US20130226876A1 (en) * | 2012-02-29 | 2013-08-29 | Construcs, Inc. | Synchronizing local clients with a cloud-based data storage system |
US9424437B1 (en) * | 2012-10-12 | 2016-08-23 | Egnyte, Inc. | Systems and methods for providing file access in a hybrid cloud storage system |
US9268929B2 (en) | 2013-03-15 | 2016-02-23 | Intelmate Llc | Dossier packaging |
-
2013
- 2013-03-15 US US13/834,677 patent/US9268929B2/en active Active
-
2014
- 2014-03-11 CA CA2845757A patent/CA2845757A1/en not_active Abandoned
-
2016
- 2016-02-02 US US15/013,744 patent/US9529988B2/en active Active
Patent Citations (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050160371A1 (en) * | 1999-08-23 | 2005-07-21 | Sentillion, Inc. | Application launchpad |
US20030101346A1 (en) * | 2000-02-29 | 2003-05-29 | Barron Austin Kesler | Method for notarizing receipt of electronic communications and enabling electronic registered mail; method for verifying identity of account party |
US20020194470A1 (en) * | 2001-06-13 | 2002-12-19 | Robert Grupe | Encrypted data file transmission |
US20060161457A1 (en) * | 2002-01-25 | 2006-07-20 | Rapaport Jeffrey A | Adaptive communication methods and systems for facilitating the gathering, distribution and delivery of information related to medical care |
US20090055220A1 (en) * | 2002-01-25 | 2009-02-26 | Rapaport Jeffrey A | Adaptive communication methods and systems for facilitating the gathering, distribution and delivery of information related to medical care |
US20110238435A1 (en) * | 2002-01-25 | 2011-09-29 | Pype Assets B.V., Llc | Adaptive communication methods and systems for facilitating the gathering, distribution and delivery of information related to medical care |
US20110099621A1 (en) * | 2002-04-22 | 2011-04-28 | Nicholas Lizarraga | Process for monitoring, filtering and caching internet connections |
US20040019648A1 (en) * | 2002-07-01 | 2004-01-29 | Hemingway Huynh | Adaptive media messaging, such as for rich media messages incorporating digital content |
US20110302258A1 (en) * | 2002-07-01 | 2011-12-08 | Prolifiq Software Inc. | Adaptive media messaging, such as for rich media messages incorporating digital content |
US20050192813A1 (en) * | 2002-08-29 | 2005-09-01 | Hewlett-Packard Development Company, L.P. | Process for data distribution through a network |
US20060053078A1 (en) * | 2002-10-18 | 2006-03-09 | Junichi Yamamoto | Content price control system, method and recording medium |
US20040199760A1 (en) * | 2003-04-01 | 2004-10-07 | Mazza Bruce P. | Ironclad notification of license errors |
US20050198165A1 (en) * | 2003-11-06 | 2005-09-08 | Reddel Frederick A.V | Systems and methods for electronic information distribution |
US20050154685A1 (en) * | 2004-01-08 | 2005-07-14 | United Parcel Service Of America, Inc. | Methods and systems providing the capability to track intra-organizational packages |
US20080294726A1 (en) * | 2004-04-22 | 2008-11-27 | Sidman George C | Private electronic information exchange |
US20100197351A1 (en) * | 2005-05-10 | 2010-08-05 | Mobile Communication Technologies, Llc | Apparatus for and system for enabling a mobile communicator |
US20070033400A1 (en) * | 2005-08-08 | 2007-02-08 | Senez Raymond C Jr | System and method for secure electronic data delivery |
US20070250920A1 (en) * | 2006-04-24 | 2007-10-25 | Jeffrey Dean Lindsay | Security Systems for Protecting an Asset |
US20070298813A1 (en) * | 2006-06-21 | 2007-12-27 | Singh Munindar P | System and method for providing a descriptor for a location to a recipient |
US20080086646A1 (en) * | 2006-10-05 | 2008-04-10 | Ceelox, Inc. | System and method of secure encryption for electronic data transfer |
US20130219179A1 (en) * | 2006-10-05 | 2013-08-22 | Ceelox Patents, LLC | System and method of secure encryption for electronic data transfer |
US20080184033A1 (en) * | 2006-11-02 | 2008-07-31 | Recombo, Inc. | System and method for generating agreements |
US20080147556A1 (en) * | 2006-12-15 | 2008-06-19 | Nbc Universal, Inc. | Digital rights management flexible continued usage system and method |
US20080162646A1 (en) * | 2006-12-29 | 2008-07-03 | Ceelox Inc. | System and method for secure and/or interactive dissemination of information |
US20130031355A1 (en) * | 2006-12-29 | 2013-01-31 | Ceelox, Inc. | System and method for secure and/or interactive dissemination of information |
US20110238990A1 (en) * | 2006-12-29 | 2011-09-29 | Ceelox, Inc. | System and method for secure and/or interactive dissemination of information |
US20080162527A1 (en) * | 2006-12-29 | 2008-07-03 | Ceelox Inc. | System and method for secure and/or interactive dissemination of information |
US20080235733A1 (en) * | 2007-03-23 | 2008-09-25 | Nextwave Broadband Inc. | System and method for personal content access |
US20080235587A1 (en) * | 2007-03-23 | 2008-09-25 | Nextwave Broadband Inc. | System and method for content distribution |
US20090013359A1 (en) * | 2007-07-05 | 2009-01-08 | Jon Butler | Individualized digital media delivery systems |
US20090070744A1 (en) * | 2007-08-28 | 2009-03-12 | Sugarcrm Inc. | CRM SYSTEM AND METHOD HAVING DRILLDOWNS, ACLs, SHARED FOLDERS, A TRACKER AND A MODULE BUILDER |
US20090228822A1 (en) * | 2008-03-10 | 2009-09-10 | Brother Kogyo Kabushiki Kaisha | Display Control Apparatus and Display Control Program |
US20090271787A1 (en) * | 2008-04-25 | 2009-10-29 | Vmware, Inc. | Linking virtualized application namespaces at runtime |
US20090282451A1 (en) * | 2008-05-08 | 2009-11-12 | Soren Borup Jensen | Method and means for a multilayer access control |
US20100037324A1 (en) * | 2008-08-07 | 2010-02-11 | Grant Calum Anders Mckay | Computer file control through file tagging |
US20100259473A1 (en) * | 2008-09-29 | 2010-10-14 | Kotaro Sakata | User interface device, user interface method, and recording medium |
US20100251173A1 (en) * | 2009-03-26 | 2010-09-30 | Sony Corporation | Information processing device, contents processing method and program |
US20110055677A1 (en) * | 2009-08-25 | 2011-03-03 | Thomas Lima | Systems and methods for associating and organizing digital files |
US20130019002A1 (en) * | 2009-11-17 | 2013-01-17 | Stc Unm | System and methods of resource usage using an interoperable management framework |
US20110276493A1 (en) * | 2010-04-30 | 2011-11-10 | Tobsc Inc. | Methods and apparatus for a financial document clearinghouse and secure delivery network |
US20110282944A1 (en) * | 2010-05-13 | 2011-11-17 | Broadvision | Systems and methods for content sharing across enterprise social networks |
US20120157040A1 (en) * | 2010-12-21 | 2012-06-21 | Sony Corporation | Information processing device, communication system, and billing method for wireless terminal device |
US20120222132A1 (en) * | 2011-02-25 | 2012-08-30 | Microsoft Corporation | Permissions Based on Behavioral Patterns |
US20130007129A1 (en) * | 2011-07-01 | 2013-01-03 | Stoneware, Inc. | Method and apparatus for application costing based on client hardware |
US20130055411A1 (en) * | 2011-08-24 | 2013-02-28 | Pantech Co., Ltd. | Apparatus and method for controlling permissions in mobile terminal |
US20130097562A1 (en) * | 2011-10-17 | 2013-04-18 | Research In Motion Corporation | System and method for navigating between user interface elements |
US20140041052A1 (en) * | 2012-04-13 | 2014-02-06 | Adobe Systems Incorporated | Methods and systems for establishing and enforcing document visibitily rights with an electronic signature service |
US20130318589A1 (en) * | 2012-04-27 | 2013-11-28 | Intralinks, Inc. | Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment |
US20140040761A1 (en) * | 2012-08-03 | 2014-02-06 | Google Inc. | Providing an update associated with a user-created point of interest |
US20140058873A1 (en) * | 2012-08-22 | 2014-02-27 | Scanavo North America Ltd. | Virtual packaging and electronic gifting system and methodology |
US20140123228A1 (en) * | 2012-10-25 | 2014-05-01 | Jacob Andrew Brill | Event Reporting and Handling |
US20140223099A1 (en) * | 2013-02-06 | 2014-08-07 | Adam Kidron | Content management platform apparatus, methods, and systems |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9529988B2 (en) | 2013-03-15 | 2016-12-27 | Intelmate Llc | Dossier packaging |
Also Published As
Publication number | Publication date |
---|---|
US20140282926A1 (en) | 2014-09-18 |
US9529988B2 (en) | 2016-12-27 |
US20160171194A1 (en) | 2016-06-16 |
CA2845757A1 (en) | 2014-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11244070B2 (en) | Adaptive remediation of multivariate risk | |
US11102232B2 (en) | Blockchain web browser interface | |
US11706217B2 (en) | Managing voice applications within a digital workspace | |
US10277588B2 (en) | Systems and methods for authenticating a user based on self-portrait media content | |
JP6785808B2 (en) | Policy forced delay | |
US20160191484A1 (en) | Secure Inmate Digital Storage | |
US9729552B2 (en) | Access violation mitigation system | |
US20150312248A1 (en) | Identity authentication | |
US10445514B1 (en) | Request processing in a compromised account | |
US8903060B2 (en) | Individual location tracking in detention environments | |
WO2021260398A1 (en) | Determining risk metrics for access requests in network environments using multivariate modeling | |
US10834079B2 (en) | Negotiative conversation chat bot | |
US9529988B2 (en) | Dossier packaging | |
US11665278B2 (en) | Contextual call handling mechanism with learned relationship filter | |
US11483355B1 (en) | System and methods for agentless managed device identification as part of setting a security policy for a device | |
US20200076784A1 (en) | In-Line Resolution of an Entity's Identity | |
US11568038B1 (en) | Threshold-based authentication | |
US20240022594A1 (en) | Detecting malicious command and control cloud traffic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TELMATE, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TORGERSRUD, RICHARD;REEL/FRAME:030545/0361 Effective date: 20130520 |
|
AS | Assignment |
Owner name: INTELMATE LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TELMATE, LLC;REEL/FRAME:037107/0411 Effective date: 20151120 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:INTELMATE LLC;REEL/FRAME:043382/0001 Effective date: 20170731 Owner name: CREDIT SUISSE AG, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:INTELMATE LLC;REEL/FRAME:043382/0128 Effective date: 20170731 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.) |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:GLOBAL TEL*LINK CORPORATION;DSI-ITI, INC.;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:048788/0014 Effective date: 20181129 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:GLOBAL TEL*LINK CORPORATION;DSI-ITI, INC.;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:047720/0576 Effective date: 20181129 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |